Araştırma Makalesi
BibTex RIS Kaynak Göster

Uzamsal Alanda Bir Kripto-Stegano Hibrit Uygulama

Yıl 2022, , 154 - 164, 31.12.2022
https://doi.org/10.55117/bufbd.1100693

Öz

Gelişen teknoloji ile birlikte iletişimde veri güvenliği ihtiyacı artmaktadır. Veri güvenliğini sağlamanın en iyi yolu kriptografidir. İnsanlık yüzlerce yıldır birçok kriptografi yöntemi önerdi. Günümüzde oldukça güvenli ancak yüksek işlem gücü gerektiren karmaşık şifreleme algoritmaları bulunmaktadır. Geçmişte kullanılan şifreleme teknikleri daha az güvenlidir ancak daha az işlem gücü gerektirir. Bu makale, eski bir şifreleme yöntemi olan Vigenère şifresinin geliştirilmiş bir versiyonunu önermektedir. Geliştirilmiş Vigenère şifresi ile oluşturulan şifre metni, iletim ortamında güvende tutmak için bir görüntüde de gizlenir. Gizleme işlemi, bir diğer veri güvenliği yöntemi olan steganografi ile gerçekleştirilir. Böylece hem şüpheden uzak hem de güvenli bir iletişim yöntemi ortaya çıkmıştır. Önerilen yöntemin kriptolojik güvenliği Avalanche etkisi ölçülmüş, steganografik güvenliği ise SSIM ve PSNR ölçümleri ile değerlendirilmiştir.

Kaynakça

  • [1] A. Saraswat, C. Khatri, Sudhakar, P. Thakral, and P. Biswas, "An Extended Hybridization of Vigenère and Caesar Cipher Techniques for Secure Communication," Procedia Computer Science, Vol. 92, pp. 355 – 360, 2016.
  • [2] K.I. Rahmani, N.Wadhwa and V. Malhotra, "Alpha-Qwerty Cipher: An Extended Vigenère Cipher," Advanced Computing: An International Journal, Vol. 3, no. 3, pp. 107-118, 2012.
  • [3] D. Gautam, C. Agrawal, P. Sharma, M. Mehta and P. Saini, "An Enhanced Cipher Technique Using Vigenère and Modified Caesar Cipher," 2nd International Conference on Trends in Electronics and Informatics, vol. 1, no. 9, 2018.
  • [4] I. Saputra, N.A. Hasibuan, Mesran and R Rahim, "Vigenère Cipher Algorithm with Grayscale Image Key Generator for Secure Text File," International Journal of Engineering Research & Technology, vol. 6, no. 1, pp. 266-269, 2017.
  • [5] K. Nahar and P. Chakraborty, "A Modified Version of Vigenère Cipher using 95 × 95 Table," International Journal of Engineering and Advanced Technology, vol. 9, no. 5, pp. 1144-1148, 2020.
  • [6] S.K. Mandal and A.R. Deepti, "A Cryptosystem Based On Vigenère Cipher By Using Mulitlevel Encryption Scheme," International Journal of Computer Science and Information Technologies, vol. 7, no. 4, pp. 2096- 2099, 2016.
  • [7] H.B. Macit, A. Koyun and M.E. Yüksel, "Embedding Data Crypted With Extended Shifting Polybius Square Supporting Turkish Character Set," BEU Fen Bilimleri Dergisi, vol. 8, no. 1, pp. 234-242, 2019.
  • [8] S.A. Laskar and K. Hemachandran, "High capacity data hiding using LSB steganography and encryption," International Journal of Database Management Systems, vol. 4, no. 6, 2012.
  • [9] A.A. Soofi, I. Riaz and U. Rasheed, "An Enhanced Vigenere Cipher For Data Security," International Journal of Scientific& Tevhnology, vol. 5, no. 3, pp. 141-145, 2016.
  • [10] K. Senthil, K. Prasanthi and R. Rajaram, "A Modern Avatar of Julius Ceasar and Vigenère Cipher," Proceedings of IEEE International Conference on Computational Intelligence and Computing Research, 2013.
  • [11] M.Z. Konyar and S. Solak, “Efficient data hiding method for videos based on adaptive inverted LSB332 and secure frame selection with enhanced Vigenere cipher,” Journal of Information Security and Applications, vol. 63, 2021.
  • [12] R. Hammad, K.A. Latif, A.Z. Amrullah, H., A. Subki, P. Irfan, M. Zulfikri, L.Z. Azhar, M. Innuddin and K. Marzuki, “Implementation of combined steganography and cryptography Vigenere cipher, caesar cipher and converting periodic tables for securing secret message,” Journal of Physics: Conference Series 2279, 2022.
  • [13] L. Voleti, R.M. Balajee, S.K. Vallepu, K. Bayoju and D. Srinivas, “A Secure Image Steganography Using Improved LSB Technique and Vigenere Cipher Algorithm, ” Proceedings of the International Conference on Artificial Intelligence and Smart Systems, pp. 1005-1010, 2021.
  • [14] J.P. Sermeno, K.A.S. Secugal, N.E. Mistio, “Modified Vigenere cryptosystem: An integrated data encryption module for learning management system,” Convergent Technologies for Innovative Learning Environment and Information Systems, vol. 18, no. 4, 2021.
  • [15] S. Hemalatha, U.D. Acharya and A. Renuka, "Comparison of Secure and High Capacity Color Image Steganography Techniques in RGB and YCbCr Domains," International Journal of Advanced Information Technology, vol. 3, no. 3, 2013.
  • [16] H.B. Macit and A. Koyun, "A New Imperceptible Steganography Method for Grayscale Images," Journal of Engineering Sciences and Design, vol. 8, no. 2, pp. 357-365, 2020.
  • [17] B. Henry, "Cipher systems, the protection of communications," London, Northwood Books, 1982

A Crypto-Stegano Hybrid Application on Spatial Domain

Yıl 2022, , 154 - 164, 31.12.2022
https://doi.org/10.55117/bufbd.1100693

Öz

The need for data security in communication is increasing with the developing
technology. The best way to ensure data security is cryptography. Humanity has
proposed many cryptography methods for hundreds of years. Today, there are
complex cryptography algorithms, which are quite secure but require high processing
power. Cryptography techniques used in the past are less secure but require less
processing power. This article proposes an extended version of the Vigenère cipher,
which is an ancient encryption method. Extended Vigenère cipher is able to encrypt
upper and lower case letters, numeric characters, and punctuation marks. In addition,
the method can use upper and lower case letters, numeric characters and punctuation
marks as encryption key, and there is no key length limit. The cipher text generated
with the extended Vigenère cipher is also hidden in an image to keep it safe in the
transmission medium. Hiding is performed with LSB steganography, which is
another data security method. Thus, both the readability and detectability of
confidential data are reduced. The cryptological security of the proposed method is
measured by the Avalanche effect. Steganographic safety is evaluated with SSIM
and PSNR measurements. A user graphical interface has been developed and the
maximum payload of the carrier image is measured before encryption. Proposed
method applied on some test images with different specifications. 1 bit key
modification avalanche effect results of proposed method with random plain texts
between 1000-10000 characters with a key length of 8 and 16 characters is close to
50%. Also, SSIM value calculated over 0.99 each time while maximum
steganographic payload of the test images reached.

Kaynakça

  • [1] A. Saraswat, C. Khatri, Sudhakar, P. Thakral, and P. Biswas, "An Extended Hybridization of Vigenère and Caesar Cipher Techniques for Secure Communication," Procedia Computer Science, Vol. 92, pp. 355 – 360, 2016.
  • [2] K.I. Rahmani, N.Wadhwa and V. Malhotra, "Alpha-Qwerty Cipher: An Extended Vigenère Cipher," Advanced Computing: An International Journal, Vol. 3, no. 3, pp. 107-118, 2012.
  • [3] D. Gautam, C. Agrawal, P. Sharma, M. Mehta and P. Saini, "An Enhanced Cipher Technique Using Vigenère and Modified Caesar Cipher," 2nd International Conference on Trends in Electronics and Informatics, vol. 1, no. 9, 2018.
  • [4] I. Saputra, N.A. Hasibuan, Mesran and R Rahim, "Vigenère Cipher Algorithm with Grayscale Image Key Generator for Secure Text File," International Journal of Engineering Research & Technology, vol. 6, no. 1, pp. 266-269, 2017.
  • [5] K. Nahar and P. Chakraborty, "A Modified Version of Vigenère Cipher using 95 × 95 Table," International Journal of Engineering and Advanced Technology, vol. 9, no. 5, pp. 1144-1148, 2020.
  • [6] S.K. Mandal and A.R. Deepti, "A Cryptosystem Based On Vigenère Cipher By Using Mulitlevel Encryption Scheme," International Journal of Computer Science and Information Technologies, vol. 7, no. 4, pp. 2096- 2099, 2016.
  • [7] H.B. Macit, A. Koyun and M.E. Yüksel, "Embedding Data Crypted With Extended Shifting Polybius Square Supporting Turkish Character Set," BEU Fen Bilimleri Dergisi, vol. 8, no. 1, pp. 234-242, 2019.
  • [8] S.A. Laskar and K. Hemachandran, "High capacity data hiding using LSB steganography and encryption," International Journal of Database Management Systems, vol. 4, no. 6, 2012.
  • [9] A.A. Soofi, I. Riaz and U. Rasheed, "An Enhanced Vigenere Cipher For Data Security," International Journal of Scientific& Tevhnology, vol. 5, no. 3, pp. 141-145, 2016.
  • [10] K. Senthil, K. Prasanthi and R. Rajaram, "A Modern Avatar of Julius Ceasar and Vigenère Cipher," Proceedings of IEEE International Conference on Computational Intelligence and Computing Research, 2013.
  • [11] M.Z. Konyar and S. Solak, “Efficient data hiding method for videos based on adaptive inverted LSB332 and secure frame selection with enhanced Vigenere cipher,” Journal of Information Security and Applications, vol. 63, 2021.
  • [12] R. Hammad, K.A. Latif, A.Z. Amrullah, H., A. Subki, P. Irfan, M. Zulfikri, L.Z. Azhar, M. Innuddin and K. Marzuki, “Implementation of combined steganography and cryptography Vigenere cipher, caesar cipher and converting periodic tables for securing secret message,” Journal of Physics: Conference Series 2279, 2022.
  • [13] L. Voleti, R.M. Balajee, S.K. Vallepu, K. Bayoju and D. Srinivas, “A Secure Image Steganography Using Improved LSB Technique and Vigenere Cipher Algorithm, ” Proceedings of the International Conference on Artificial Intelligence and Smart Systems, pp. 1005-1010, 2021.
  • [14] J.P. Sermeno, K.A.S. Secugal, N.E. Mistio, “Modified Vigenere cryptosystem: An integrated data encryption module for learning management system,” Convergent Technologies for Innovative Learning Environment and Information Systems, vol. 18, no. 4, 2021.
  • [15] S. Hemalatha, U.D. Acharya and A. Renuka, "Comparison of Secure and High Capacity Color Image Steganography Techniques in RGB and YCbCr Domains," International Journal of Advanced Information Technology, vol. 3, no. 3, 2013.
  • [16] H.B. Macit and A. Koyun, "A New Imperceptible Steganography Method for Grayscale Images," Journal of Engineering Sciences and Design, vol. 8, no. 2, pp. 357-365, 2020.
  • [17] B. Henry, "Cipher systems, the protection of communications," London, Northwood Books, 1982
Toplam 17 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgisayar Yazılımı
Bölüm Araştırma Makaleleri
Yazarlar

Hüseyin Bilal Macit 0000-0002-5325-5416

Yayımlanma Tarihi 31 Aralık 2022
Yayımlandığı Sayı Yıl 2022

Kaynak Göster

APA Macit, H. B. (2022). A Crypto-Stegano Hybrid Application on Spatial Domain. Bayburt Üniversitesi Fen Bilimleri Dergisi, 5(2), 154-164. https://doi.org/10.55117/bufbd.1100693
AMA Macit HB. A Crypto-Stegano Hybrid Application on Spatial Domain. Bayburt Üniversitesi Fen Bilimleri Dergisi. Aralık 2022;5(2):154-164. doi:10.55117/bufbd.1100693
Chicago Macit, Hüseyin Bilal. “A Crypto-Stegano Hybrid Application on Spatial Domain”. Bayburt Üniversitesi Fen Bilimleri Dergisi 5, sy. 2 (Aralık 2022): 154-64. https://doi.org/10.55117/bufbd.1100693.
EndNote Macit HB (01 Aralık 2022) A Crypto-Stegano Hybrid Application on Spatial Domain. Bayburt Üniversitesi Fen Bilimleri Dergisi 5 2 154–164.
IEEE H. B. Macit, “A Crypto-Stegano Hybrid Application on Spatial Domain”, Bayburt Üniversitesi Fen Bilimleri Dergisi, c. 5, sy. 2, ss. 154–164, 2022, doi: 10.55117/bufbd.1100693.
ISNAD Macit, Hüseyin Bilal. “A Crypto-Stegano Hybrid Application on Spatial Domain”. Bayburt Üniversitesi Fen Bilimleri Dergisi 5/2 (Aralık 2022), 154-164. https://doi.org/10.55117/bufbd.1100693.
JAMA Macit HB. A Crypto-Stegano Hybrid Application on Spatial Domain. Bayburt Üniversitesi Fen Bilimleri Dergisi. 2022;5:154–164.
MLA Macit, Hüseyin Bilal. “A Crypto-Stegano Hybrid Application on Spatial Domain”. Bayburt Üniversitesi Fen Bilimleri Dergisi, c. 5, sy. 2, 2022, ss. 154-6, doi:10.55117/bufbd.1100693.
Vancouver Macit HB. A Crypto-Stegano Hybrid Application on Spatial Domain. Bayburt Üniversitesi Fen Bilimleri Dergisi. 2022;5(2):154-6.

Taranılan Dizinler